Files
linux/tools/testing/selftests/bpf/progs/verifier_default_trusted_ptr.c
Matt Bobrowski dd341eacdb selftests/bpf: update verifier test for default trusted pointer semantics
Replace the verifier test for default trusted pointer semantics, which
previously relied on BPF kfunc bpf_get_root_mem_cgroup(), with a new
test utilizing dedicated BPF kfuncs defined within the bpf_testmod.

bpf_get_root_mem_cgroup() was modified such that it again relies on
KF_ACQUIRE semantics, therefore no longer making it a suitable
candidate to test BPF verifier default trusted pointer semantics
against.

Link: https://lore.kernel.org/bpf/20260113083949.2502978-2-mattbobrowski@google.com
Signed-off-by: Matt Bobrowski <mattbobrowski@google.com>
Link: https://lore.kernel.org/r/20260120091630.3420452-1-mattbobrowski@google.com
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
2026-01-20 17:11:24 -08:00

30 lines
707 B
C

// SPDX-License-Identifier: GPL-2.0
/*
* Copyright 2026 Google LLC.
*/
#include <vmlinux.h>
#include <bpf/bpf_helpers.h>
#include <bpf/bpf_tracing.h>
#include "bpf_misc.h"
#include "../test_kmods/bpf_testmod_kfunc.h"
SEC("syscall")
__success __retval(0)
int test_default_trusted_ptr(void *ctx)
{
struct prog_test_member *trusted_ptr;
trusted_ptr = bpf_kfunc_get_default_trusted_ptr_test();
/*
* Test BPF kfunc bpf_get_default_trusted_ptr_test() returns a
* PTR_TO_BTF_ID | PTR_TRUSTED, therefore it should be accepted when
* passed to a BPF kfunc only accepting KF_TRUSTED_ARGS.
*/
bpf_kfunc_put_default_trusted_ptr_test(trusted_ptr);
return 0;
}
char _license[] SEC("license") = "GPL";